SciShow
What Happens to an Email After You Click "Send"?
Email is one of the most essential things to our life. But do you actually know what happens when you click the "send" button, and how it's sent to your friends?
Crash Course
The Core of a Business - Key Activities & Resources: Crash Course Business Entrepreneurship
When someone says they’re “studying business” or they “work in business,” they could mean so many different things. They could be in marketing, sales, finance or human resources. So much goes into keeping a company running smoothly.
MinuteEarth
How Risky Are Vaccines?
Want to learn more about the topic in this week's video? Here's a keyword to get your googling started: herd immunity: immunity that occurs when the vaccination of a portion of a population provides protection for individuals who have...
Crash Course
The Internet: Crash Course Computer Science
Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader...
Curated Video
Is YouTube Social Media
Unveil the truth about YouTube and its classification as social media in this informative video. Explore the characteristics and functionalities of YouTube to understand its role in the digital landscape. Discover the similarities and...
Curated Video
Customer Lifecycle
Dive into the customer lifecycle journey in this informative video. Explore how businesses can effectively engage and nurture customers throughout their entire journey, from the moment of acquisition to becoming loyal advocates. Discover...
Curated Video
SEO KPIs
Measure and track your success in search engine optimization (SEO) with the help of SEO Key Performance Indicators (KPIs) in this insightful video. Discover the essential metrics and KPIs that can gauge the effectiveness of your SEO...
Curated Video
Customer Acquisition
Unlock the secrets of customer acquisition in this insightful video. Learn the strategies and techniques to attract and convert potential customers . Explore effective approaches like lead generation, targeting, and conversion...
Curated Video
Ecommerce Customer Retention Strategy
Dive into the world of ecommerce customer retention strategy in this insightful video. Discover the techniques and tactics to foster lasting relationships with your customers. Explore loyalty programs, personalized experiences,...
Curated Video
How to use keywords in your job search
With so many resumes to review, a lot of companies use keyword searches in Applicant Tracking Systems to trim down the pile. So if your resume doesn't contain some of those matching keywords, it may never even get looked at. Find out why...
Curated Video
Landmarks - Amazing Art of Stephen Wiltshire
AMAZING ART OF STEPHEN WILTSHIRE STEVEN WILTSHIRE HAS BEEN BLESSED WITH A SPECIAL TALENT. STEVEN IS A SAVANT, A TYPE OF GENIUS LIVING IN A VERY PRIVATE WORLD. HE DID NOT SPEAK A WORD UNTIL HE WAS SEVEN YEARS OLD. IT WAS AN EXTRAORDINARY...
Curated Video
Lookalike Letters Phishing Attacks
Uncover the threat of look-alike letters phishing attacks in this informative video. Explore how cybercriminals use devious tactics to mimic legitimate correspondence, luring unsuspecting victims into divulging sensitive information....
Curated Video
How to Work a Career Fair
Career fairs are one of the best ways for students to meet prospective employers and ultimately land a job. But you can't just roll out of bed and show up! Billy walks us through all the steps to make the career fair a success, from...
Great Big Story
Meet mira modi, the teen turning passwords into art
Explore the creative world of Mira Modi, a young entrepreneur who crafts secure, hard-to-crack passwords using a dice-based system.
Curated Video
Only In South Korea 2 - Web Guitarist's Viral Fame
Web Guitarist's Viral Fame:A student enjoys global fame after his guitar skills go viral, accumulating over eight million views in just five minutes and 20 seconds.
Curated Video
Is Your Project STUCK in the Middle?
It seems that people feel motivated near the start of a task, because they can easily see their own progress. And, as they near the end, the feeling that their close to finishing draws them on. But, in the middle, motivation sags. Is...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Way Back Machine
This service serves as a database or archive of snapshots of webpages from the past or even just before changing the current website as a reference.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How We Are Tracked Online
This video demonstrates online examples of how we are tracked and how our preferences are monitored and recorded online.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Understanding the DNS System
In the lesson, you will learn about the domain name system responsible for translating domain names into IP addresses.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Burp Suite
This video demonstrates Burp Suite, a powerful tool used to detect vulnerabilities on a website.
Curated Video
Practical Cyber Hacking Skills for Beginners - Web Attack - Cross-Site Scripting
In this lesson, we will look at cross-site scripting, which is a client-side attack that targets the victim's browser with malicious code.
Curated Video
Practical Cyber Hacking Skills for Beginners - Understanding Databases and SQL
In this lesson, we will look at databases and structured query language (SQL) and how they can be used to manipulate and retrieve data.